// For flags

CVE-2017-6339

Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 SP2 - Multiple Vulnerabilities

Severity Score

6.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 6.5 before CP 1746 mismanages certain key and certificate data. Per IWSVA documentation, by default, IWSVA acts as a private Certificate Authority (CA) and dynamically generates digital certificates that are sent to client browsers to complete a secure passage for HTTPS connections. It also allows administrators to upload their own certificates signed by a root CA. An attacker with low privileges can download the current CA certificate and Private Key (either the default ones or ones uploaded by administrators) and use those to decrypt HTTPS traffic, thus compromising confidentiality. Also, the default Private Key on this appliance is encrypted with a very weak passphrase. If an appliance uses the default Certificate and Private Key provided by Trend Micro, an attacker can simply download these and decrypt the Private Key using the default/weak passphrase.

El dispositivo virtual de InterScan Web Security de Trend Micro (IWSVA) 6.5 en versiones anteriores a CP 1746 maneja mal ciertos datos de clave y certificado. Por IWSVA, por defecto, IWSVA actúa como una entidad de certificación privada (CA) y genera dinámicamente certificados digitales que se envían a los navegadores de cliente para completar un paso seguro para conexiones HTTPS. También permite a los administradores cargar sus propios certificados firmados por una root CA. Un atacante con privilegios bajos puede descargar el certificado actual de la CA y la clave privada (ya sea los predeterminados o los subidos por los administradores) y utilizarlos para descifrar el tráfico HTTPS, comprometiendo así la confidencialidad. Además, la clave privada predeterminada de este dispositivo se cifra con una contraseña muy débil. Si un dispositivo utiliza el certificado predeterminado y la clave privada proporcionada por Trend Micro, un atacante puede simplemente descargarlos y descifrar la clave privada usando la contraseña predeterminada/débil.

Trend Micro Interscan Web Security Virtual Appliance (IWSVA) version 6.5 SP2 suffers from faulty access controls, stored cross site scripting, and information disclosure vulnerabilities

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-01-12 First Exploit
  • 2017-02-26 CVE Reserved
  • 2017-04-05 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-269: Improper Privilege Management
  • CWE-521: Weak Password Requirements
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Trendmicro
Search vendor "Trendmicro"
Interscan Web Security Virtual Appliance
Search vendor "Trendmicro" for product "Interscan Web Security Virtual Appliance"
<= 6.5
Search vendor "Trendmicro" for product "Interscan Web Security Virtual Appliance" and version " <= 6.5"
-
Affected